Search
Search Results
-
Building a Cybersecurity Awareness Program: Present and Prospective Aspects
This chapter discusses present and prospective aspects of cybersecurity awareness (CSA) initiatives. Concerning the first, it presents practices... -
Full-program induction: verifying array programs sans loop invariants
Arrays are commonly used in a variety of software to store and process data in loops. Automatically proving safety properties of such programs that...
-
Model and Program Repair via Group Actions
Given a textual representation of a finite-state concurrent program \(P\)... -
The National Innovative Program for Housing Quality (PINQuA). Strategies and Indicators for Design Quality
In recent years, the debate on new models of living and experiencing urban spaces has been fuelled by events that have highlighted the fragilities... -
On the analysis of collaboration networks between industry and academia: the Mexican case of the innovation incentive program
The responsible for proposing public policies have to decide how to allocate economic resources to boost Research & Development in target industrial...
-
Automated regression unit test generation for program merges
We propose test oracles for real-world program merges including two-way, three-way, and octopus merges. On this basis, we implemented a tool called...
-
Software Testing: 5th Comparative Evaluation: Test-Comp 2023
The 5th edition of the Competition on Software Testing (Test-Comp 2023) provides again an overview and comparative evaluation of automatic test-suite... -
How much does a Ph.D. scholarship program impact an emerging economy research performance?
This paper presents an impact evaluation of scholarships, within the Brazilian context, on the scientific performance of Ph.D. holders. The objective...
-
Origami: (un)folding the Abstraction of Recursion Schemes for Program Synthesis
Program synthesisProgram synthesis with Genetic Programming searches for a correct program that satisfies the input specification, which is usually... -
Based on the 2010–2022 Review of Domestic and Foreign Educational Evaluation and University Internal Evaluation Methods
As technology and education systems continue to improve, education evaluation is also gradually becoming intelligent and standardized, but there are... -
Execution Time Program Verification with Tight Bounds
This paper presents a proof system for reasoning about execution time bounds for a core imperative programming language. Proof systems are defined... -
Information Security Awareness Program for Employees of the Organization: The Activity Approach
AbstractThe article actualizes the problem of the content of the employee awareness program concerning the information security of their organization...
-
Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation
Figuring out whether a particular semantic functionality exists in a binary program is challenging. While pattern-matching-based detection is... -
How to Program in MicroPython
Now that we have a basic understanding of the available MicroPython boards, we can learn more about programming in MicroPython – a very robust and... -
The Next 700 Program Transformers
In this paper, we describe a hierarchy of program transformers, capable of performing fusion to eliminate intermediate data structures, in which the... -
Scenario of Information Flow Analysis Implementation in PL/SQL Program Units with PLIF Platform
AbstractFormal proof of security measure effectiveness and computation security is vitally important for trust in critical information systems. It...
-
Model and Program Transformation
So far, we focused on defining the syntax of DSLs in efficient ways. We worked with abstract and concrete syntax. We have seen tools that can... -
Automatic program bug fixing by focusing on finding the shortest sequence of changes
Automatic bug repair as the last step in program repair has attracted a lot of research attention. Various ideas and techniques have been presented...
-
Automatic Rollback Suggestions for Incremental Datalog Evaluation
Advances in incremental Datalog evaluation strategies have made Datalog popular among use cases with constantly evolving inputs such as static... -
Generalized Program Sketching by Abstract Interpretation and Logical Abduction
This paper presents a new approach for synthesizing missing parts from imperative programs by using abstract interpretation and logical abduction....